Don't get caught on the Hacker's hook.

Don't get caught on the Hacker's hook.

Trophy Phishing

Introduction:

People keep clicking the links and downloading the files, so why would the hackers stop sending them?

Hackers are on the hunt for their next big trophy phishing catch, and they are waiting for you to take the bait. This newsletter covers the top targets that hackers have in their sights, the bait and tactics they use to catch them and the defensive solutions you need to have in place to protect your employees and customers.

No alt text provided for this image

Hackers Favourite Lures:

No alt text provided for this image
  • Spear Fishing: Spear phishing attacks take a much more targeted approach, requiring the hacker to study the victim before drafting the perfect email.
  • Executive Whaling: Targets the top executives and administrators, focused on siphoning off money from accounts or stealing confidential data.
  • Phishing: Phishing emails take a large sweep approach to attacking users and acquiring sensitive information.
  • Social Engineering: A way to mine information from social media sites to gain insight into how to craft the emails

Who are your organisation's top targets?

No alt text provided for this image

Every layer of your business has a trophy target just waiting to get caught on the hacker's hook. The best way you can protect them is to know the type of bait that the hacker will try to use and educate them on how to spot these threats when they cross their inbox. Learn more about the top 5 trophy targets in your organisation and the bait hackers will use against them.

Trophy Target: CEO

It’s easy enough for hackers to find information on a company. Just a quick search of the company page, or social media sites like LinkedIn, makes it easy for them to find the names, email addresses of members of finance or legal teams.

A simple email with a spoofed email address from a clerk on the legal team and a subject line with the threat of a lawsuit is sure to make even a CEO click any link.

Trophy Target: Finance

If the CEO asks you to do something, it’s usually in your best interest to do what they’re asking (within reason). So, if you’re on the finance team and the CEO asks you to transfer some funds, why would you second guess that? Hackers understand this, which is why they’ll often spoof an email from the boss to get quick action from any employee. If they take the bait and click the transfer link, they’ll be handing account information right over to the hacker.

Trophy Target: Sales

Salespeople are used to fielding emails and phone calls from prospective clients and customers. They’re eager to respond to any email that comes through that could be the next big catch. It’s easy enough for a hacker to find a salesperson’s information (I mean… you know they’re on LinkedIn) and they can be pretty confident that any email they send will at least be opened. A credential theft from these users would provide access to customer lists, pricing sheets, and confidential deal information.

Stealing their accounts will also allow for a new phishing attack vector to members of the finance, management, and account teams, who would trust messages from the salesperson. This is the trophy phish that leads to many other great catches!

Trophy Target: HR

Regardless of the standard practices, members of your human resources team are used to receiving resumes via email. And while they might not open everyone, hackers know that if they craft the right email there’s a chance that the HR team could open the email and download the attachment. From there, the hacker has access to sensitive employee information, including social security numbers, addresses, phones numbers, even the details of emergency contacts.

Trophy Target: Operations

Shipping attachments for UPS and DHL orders are another common way that attackers gain access to your business. Operations and facilities team members (or even regular staff that often receive shipments) are used to receiving these types of emails with an attachment containing important shipping information. Subject lines like “missing package” or “issue with delivery” are certainly going to get their attention. Hackers know that even if this part of your organisation isn’t expecting a shipment, they’re still pretty likely to open that email and click that link or download that attachment.

How to keep off the hacker's hook.

No alt text provided for this image

While these phishing attacks can leave you swimming away towards calmer waters, having the right defences in place can keep you, your employees and your customers protected. Crusade offers a robust portfolio of security solutions to ensure that you’re secure at every layer and against every type of attack.

If you'd like more information on how I can protect your business, please drop me a DM.

No alt text provided for this image
Alex Hall

?? The DNA Fat Loss Coach ?? Lose Stubborn Belly Fat WITHOUT Working Harder | Time Efficient, Data-Driven Coaching for Executives | Corporate Wellbeing Programs | Fellow of the Royal Society for Public Health

3 年

Very interesting Andy Newbrook! Would you say "spear fishing" and "social engineering" as quite similar then as the info from the latter can be used to personalise the former?

回复
Harry W.

“I have seen flowers grow in stony places, and kind things done by men with ugly faces" | Repairing leathergoods and making ??Handmade ??Bespoke ??Leathergoods in?Norfolk

3 年

Thank you Andy, that was interesting

回复

要查看或添加评论,请登录

Andy Newbrook的更多文章

社区洞察

其他会员也浏览了